what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

mwmp9.txt

mwmp9.txt
Posted Dec 30, 2004
Authored by Arman Nayyeri | Site 4rman.com

Microsoft Windows Media Player 9 allows for writing to audio files from Internet Explorer, which may allow for code execution in a trusted zone. It also suffers from a file existence determination flaw.

tags | advisory, code execution
systems | windows
SHA-256 | 4d1d231b66266a8e3548977c91e0751ddf0c2f4ba91f9fd9343d1f8dc25a2d89

mwmp9.txt

Change Mirror Download



Microsoft Windows Media Player 9 Vulns
======================================
Title: Microsoft Windows Media Player 9 Vulns (2)
HappyName: MS-WMP9-2P-BY-R/\/\AN
Date: Friday, April 17, 2004
Software: Microsoft Windows Media Player 9
Vendor: Microsoft Corporation
Patch: Fixed in Microsoft Windows Media Player 10
Author: Arman Nayyeri, arman-n[at]phreaker[daat]net, http://www.4rman.com
Severity: As little as heaven! (seriously: Moderate)


Description:
============
I have been reported this vulns on "Monday, July 05, 2004 4:11 PM" to microsoft.
They finally corrected these flaws in WMP 10. So I just wait some time for some
people to install WMP 10, now it's showtime!


Windows Media Player Allows Writing To Audio Files: (WMP-AWTAF)
===============================================================
The Windows Media Player allow the name of artist and song be changed by
using windows media player control in Internet explorer,
so it will allow an attacker to overwrite the artist and album and song
name of a music file by finding a mp3 file (for example).
It is not so much important itself but become more important if we can
cause IE to parse the mp3 file then we can easily inject script
in my computer zone, there is some default music files that exists when
windows get installed (ME and XP), so it will become more
easier to exploit.

something like this:
WindowsMediaPlayer.currentMedia.setItemInfo("Artist",'<script>alert("Hello");</'+'script>');

but actually I never found such vuln in IE which cause such severity!
Because I'm so busy, take a look at "I need some help!" section.

So I left it as an exercise for the attacker ;)


Windows Media Player ActiveX Object Expose Existence Of Files: (WMP-AXOEEOF)
============================================================================
There is a way to determine if a file exists and if it exists find it's size. I have
used the getItemInfoByAtom() function with a magical number. the magical number is 19
which actually used to get the file size. But we can open any (music or non-music)
files by WMP ActiveX and call this function on it. it will return 0 if the file does
not exists (or is empty) and return the size if it exists.


Exploit:
========
The exploits for WMP-AWTAF and WMP-AXOEEOF (read it a'zoe'e'of) can be found at:

http://www.4rman.com/security.htm


enjoy my website. And you may also enjoy hackin' my website too!
http://www.4rman.com



Exploit Tested On
=================
Windows Media Player 9.0
on
Microsoft Windows XP
Microsoft Windows XP SP1
Microsoft Windows XP SP2

Vendor Status
=============
Microsoft notified about 6 month ago.
The bug fixed in Windows Media Player 10.


Special Thanks
==============
Special thanks to my FAMILY


Do I discover more vulnerabilities?
===================================
I'm so busy these days.
Read below.



I need some help! HELP!! HELP!! HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
==============================================================================
I'm in the way of my research and I actually need some help about viruses.
let me tell you some about my research:

I'm working on a virus defense system which does not rely on Virus Signatures at all.
I used some ways to defend viruses and trojan when they want to spread or damage the
computer.It's almost 8 months which I started this research. I called it Instantaneous
Defense Technology (IDT). I'm working alone. First of all I want to know if there is
anyone who is interested in supporting me and my research. And if there is someone who
really have nice info in this subject and can help me in this way. The beta version of
a sample program based on IDT will be released in the next 6 months. Also I'm ready to
cooperate with any company which have a nice offer for working in this subject. In march
I will need some virus/trojan samples. If anyone have virus samples or knows how to get
samples contact me. I will continue my research until I get a nice offer.



Disclaimer:
===========
Arman Nayyeri is not responsible for the misuse of the information
provided in this advisory. The opinions expressed are my own and not of
any company. In no event shall the author be liable for any damages
whatsoever arising out of or in connection with the use or spread of this
advisory. Any use of the information is at the user's own risk.



~~~~~~~~~~~~~~
and sorry for my f*%#in' poor english,
Arman Nayyeri
From
Persia (or Iran)
http://www.4rman.com
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close